The Backdoor.Win32.Cidox.andn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.
Gridinsoft Anti-Malware
Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
What Backdoor.Win32.Cidox.andn virus can do?
- SetUnhandledExceptionFilter detected (possible anti-debug)
- Attempts to connect to a dead IP:Port (1 unique times)
- Yara rule detections observed from a process memory dump/dropped files/CAPE
- Creates RWX memory
- Possible date expiration check, exits too soon after checking local time
- Anomalous file deletion behavior detected (10+)
- Dynamic (imported) function loading detected
- Performs HTTP requests potentially not found in PCAP.
- Reads data out of its own binary image
- A process created a hidden window
- Drops a binary and executes it
- The binary contains an unknown PE section name indicative of packing
- The binary likely contains encrypted or compressed data.
- The executable is compressed using UPX
- Authenticode signature is invalid
- A scripting utility was executed
- Uses Windows utilities for basic functionality
- Uses Windows utilities for basic functionality
- Created a process from a suspicious location
- Steals private information from local Internet browsers
- Network activity contains more than one unique useragent.
- A script process initiated network activity
- Attempts to modify proxy settings
- The sample wrote data to the system hosts file.
How to determine Backdoor.Win32.Cidox.andn?
File Info:
name: B131B18060888BF44761.mlwpath: /opt/CAPEv2/storage/binaries/fb57adec9d44173f9602b31fbecea0888c8f88773fb083ab52a88516a7e26f9ecrc32: A3AA2BACmd5: b131b18060888bf447611d440ab6ecf6sha1: db61217a906c5b64bad75b6e9921ebdf5e9720b9sha256: fb57adec9d44173f9602b31fbecea0888c8f88773fb083ab52a88516a7e26f9esha512: 01c7097788cbc509c6aa8e5d32476eac4b0a0511e2c15ee348dcdce865d042f343a181a786a871ab7ce6925aeb00b9b1ed5a0f4aed521f9ce9018d60e7dfa032ssdeep: 12288:gwraJyjoEaTXJDCbVrAcaWV73YjndXfORfz8ViEmHuPvnRrchFhhovHeoS:gGWy87XJYLxGBXAfwViEmHySJhovHtype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T12CE423A743928884EA11DA7066CB364C7F277D011D912CC325D1690DB7379BBED3B2EAsha3_384: 4b63cd5f25757953bc85bdaba4589c1755cc195bb44758ebd1116a7c1ee1308dbdd234872faf1fdcf170d7ae458c2de8ep_bytes: 60be15e046008dbeeb2ff9ff5789e58dtimestamp: 2010-11-08 13:12:07Version Info:
0: [No Data]
Backdoor.Win32.Cidox.andn also known as:
Lionic | Adware.Win32.LMN.2!c |
Elastic | malicious (moderate confidence) |
DrWeb | Trojan.Inject1.14677 |
MicroWorld-eScan | Gen:Heur.SMHeist.2 |
FireEye | Generic.mg.b131b18060888bf4 |
ALYac | Trojan.Generic.8700137 |
Cylance | Unsafe |
Sangfor | Adware.Win32.LMN.gen |
K7AntiVirus | Trojan ( 005850dc1 ) |
K7GW | Trojan ( 005850dc1 ) |
Cybereason | malicious.060888 |
BitDefenderTheta | Gen:NN.ZexaF.34712.BqW@ai5HgPgi |
Cyren | W32/Agent.JL.gen!Eldorado |
ESET-NOD32 | multiple detections |
TrendMicro-HouseCall | TROJ_GEN.R002C0DF622 |
Paloalto | generic.ml |
ClamAV | Win.Trojan.Downloader-62666 |
Kaspersky | Backdoor.Win32.Cidox.andn |
BitDefender | Gen:Heur.SMHeist.2 |
NANO-Antivirus | Riskware.Win32.InstallToolbar.dfmaym |
Avast | FileRepMalware [Trj] |
Tencent | Win32.Backdoor.Cidox.Pbyf |
Ad-Aware | Trojan.Generic.8700137 |
Sophos | Mal/Generic-S (PUA) |
Comodo | Malware@#1170nym4uhh23 |
TrendMicro | TROJ_GEN.R002C0DF622 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.jc |
Trapmine | suspicious.low.ml.score |
Emsisoft | Gen:Heur.SMHeist.2 (B) |
Ikarus | Trojan.SuspectCRC |
GData | Gen:Variant.Symmi.8880 |
MAX | malware (ai score=82) |
Arcabit | Trojan.SMHeist.2 |
ViRobot | Backdoor.Win32.A.Cidox.712192 |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Cynet | Malicious (score: 100) |
McAfee | Artemis!B131B1806088 |
VBA32 | Backdoor.Cidox |
Malwarebytes | Malware.Heuristic.1003 |
APEX | Malicious |
Rising | Trojan.QHosts!8.52B (CLOUD) |
Yandex | Riskware.Multibar!vKMKARQyXWk |
SentinelOne | Static AI – Suspicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Kryptik.APTP!tr |
AVG | FileRepMalware [Trj] |
Panda | Trj/CI.A |
CrowdStrike | win/malicious_confidence_60% (W) |
How to remove Backdoor.Win32.Cidox.andn?
- Download and install GridinSoft Anti-Malware.
- Open GridinSoft Anti-Malware and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Select proper browser and options – Click “Reset”.
- Restart your computer.
Leave a Comment